Student Edition | Instructor Edition | Information Center | Home
TCP/IP Protocol Suite, 4/e
Student Edition
Student Solutions
Chapter 01 - Multi...
Chapter 02 - Multi...
Chapter 03 - Multi...
Chapter 04 - Multi...
Chapter 05 - Multi...
Chapter 06 - Multi...
Chapter 07 - Multi...
Chapter 08 - Multi...
Chapter 09 - Multi...
Chapter 10 - Multi...
Chapter 11 - Multi...
Chapter 12 - Multi...
Chapter 13 - Multi...
Chapter 14 - Multi...
Chapter 15 - Multi...
Chapter 16 - Multi...
Chapter 17 - Multi...
Chapter 18 - Multi...
Chapter 19 - Multi...
Chapter 20 - Multi...
Chapter 21 - Multi...
Chapter 22 - Multi...
Chapter 23 - Multi...
Chapter 24 - Multi...
Chapter 25 - Multi...
Chapter 26 - Multi...
Chapter 27 - Multi...
Chapter 28 - Multi...
Chapter 29 - Multi...
Chapter 30 - Multi...

Feedback
Help Center




Chapter 29 - Multiple Choice Quiz



1

In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).
A)symmetric-key
B)asymmetric-key
C)public-key
D)None of the choices are correct
2

In _________ cryptography, the same key is used in both directions.
A)symmetric-key
B)asymmetric-key
C)public-key
D)None of the choices are correct
3

_________ cryptography is often used for long messages.
A)Symmetric-key
B)Asymmetric-key
C)public-key
D)None of the choices are correct
4

___________ cryptography is often used for short messages.
A)Symmetric-key
B)Asymmetric-key
C)Secret-key
D)None of the choices are correct
5

__________means that the sender and the receiver expect confidentiality.
A)Non-repudiation
B)Integrity
C)Authentication
D)None of the choices are correct
6

___________ means that the data must arrive at the receiver exactly as they were sent.
A)Non-repudiation
B)Message integrity
C)Authentication
D)None of the choices are correct
7

______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.
A)Non-repudiation
B)Message integrity
C)Message authentication
D)None of the choices are correct
8

______________ can provide authentication, integrity, and nonrepudiation for a message.
A)Encryption/decryption
B)Digital signature
C)Compression
D)None of the choices are correct
9

Digital signature does not provide _________.
A)non-repudiation
B)privacy
C)authentication
D)provides all of the above
10

In ___________, the entity identity is verified once for the entire duration of system access.
A)entity authentication
B)message integrity
C)message authentication
D)None of the choices are correct
11

In __________ cryptography, everyone has access to everyone's public key.
A)symmetric-key
B)asymmetric-key
C)secret-key
D)None of the choices are correct
12

After a message is encrypted, it is called _______.
A)plaintext
B)ciphertext
C)cryptotext
D)None of the choices are correct
13

If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.
A)19
B)20
C)190
D)200
14

In the asymmetric-key method of cryptography, which key is publicly known?
A)encryption key only
B)decryption key only
C)both keys
D)None of the choices are correct
15

In the asymmetric-key method of cryptography, the receiver has possession of the _______.
A)private key
B)public key
C)none of the keys
D)None of the choices are correct
16

The RSA algorithm uses _______ cryptography method.
A)an asymmetric-key
B)a private-key
C)a symmetric-key
D)None of the choices are correct
17

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
A)user A
B)user B
C)the network
D)None of the choices are correct
18

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
A)his or her own symmetric key
B)his or her own private key
C)his or her own public key
D)None of the choices are correct
19

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
A)her or his own symmetric key
B)her or his own private key
C)the sender's public key
D)None of the choices are correct
20

A _______ is a trusted third party that solves the problem of symmetric-key distribution.
A)CA
B)KDC
C)TLS
D)firewall
21

A _______ certifies the binding between a public key and its owner.
A)CA
B)KDC
C)TLS
D)None of the choices are correct